FTP Server and Client

Description
In this exercise you are asked to design and develop a custom concurrent FTP Server named TigerS and its associated FTP client named TigerC. Once TigerS starts on a host, it will listen for incoming requests from multiple TigerC clients. You are requested to implement three basic commands for TigerS and TigerC:

1. tconnect <TigerS IP Address> <User> <Password>: This command takes the IP address of the TigerS, and the client user name and a password as parameters. If the provided user name and password are correct, then the client is allowed to connect TigerS, otherwise an error message is returned.

2. tget <File Name>: The command expects the name of the file to download from TigerS as parameter. If the file exists, it is downloaded from the server, otherwise an error message is displayed.

3. tput <File Name>: The tput command takes the name of the file to upload and uploads it to the TigerS host.

M4A1: Cybersecure… or not so secure

Data breaches in health care have become almost common occurrences in the national news as professional hackers and phishers infiltrate healthcare industry systems. In addition, with widespread deployment of mobile technologies, threats of exposure of secure data are very real.

In this assignment, address the following bullet points. 

1. Choose one type of security breach facing the healthcare industry.

2. Provide 2 examples of this type of security breach that have occurred within the last 5 years.

3. Identify the key stakeholders in each breach and describe how they are impacted.

4.Briefly describe key regulations that impact this type of breach.

5.Recommend security strategies that might have prevented these incidences from occurring. (Be sure to look at both the individual and organizational level).

5.If you were on the cybersecurity task force in a healthcare institution, what additional policies/regulations would you recommend be enacted or enforced to address these security issues?

INTRODUCTION TO SCIENCE

For this assignment you will develop a PowerPoint Presentation that is approximately 1-10 slides in length and addresses the requirements outlined above. Place the text containing the answers to the questions above in the slide area, summarizing each topic using bullet points (in your own words, you may expand in more detail using the notes area). Use 4-5 bullet points per slide. Avoid using lengthy sentences and paragraphs. Maintain consistent font sizes throughout the presentation.

Be sure to include citations referencing your sources on each slide (use either the slide or notes area). Include a descriptive title for each slide that describes the topic being discussed. Be sure to include a title slide with your name, assignment type (ex. Project 1) and course title. Include a slide summarizing your project findings (Conclusion slide). Your final slide should contain a list of references cited in APA format.

CEO of Flower Power INC

(I AM ONLY REQUIRED TO DO #4)

Fact pattern

You are the CEO of Flower Power, Inc., a fast growing chain of 100 florist shops based in the Southeastern United States.  The company opened for business 5 years ago with just 20 employees and now has over 1500 employees.
The company is now in the process of installing a new computer network, which will, for the first time, link all of the companys offices and locations.  The companys Chief Information Officer has approached you with a proposal to include a number of electronic surveillance features in the new network.

The proposed features include:

The ability of all MIS staff to view any employee emails at any time
The ability of all MIS staff to monitor what internet sites employees are viewing at any time
The ability of all MIS staff to shadow PCs of any employees, at any time, without the consent of those employees (shadowing allows a person, such as the MIS staff person, to monitor all a users activity on your PC from a remote location without the users knowledge)
If a PC or laptop is issued for an employees use away from the office for work use, all email and activities on that PC or laptop can be monitored as well
Cameras will be installed on PCs of every employee, allowing all MIS staff to monitor activities of every employee in their workspaces at any time
Your approval is needed to install this network and these features.

1.Identify the ethical dilemma
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
2.Who are the stakeholders (not limited to shareholders). Evaluate the stakeholders and how the various stakeholders would be affected by your dilemma.
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________

3.Discuss the pros and cons of alternative courses of action
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
4.Recommend a decision and provide a rationale for your decision
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________